2024-10-23 19:10:13 +02:00
2024-08-31 09:31:49 +02:00
2024-09-08 16:12:19 +02:00
2024-10-19 21:30:13 +02:00
2024-08-15 19:00:01 +02:00
2024-09-01 20:11:25 +02:00
2024-08-17 15:30:57 +02:00
2024-08-15 19:00:01 +02:00
2024-10-23 19:10:13 +02:00
2024-10-23 19:10:13 +02:00

Windows User Space Emulator

A high-performance Windows process emulator that operates at the syscall level, providing full control over process execution through comprehensive hooking capabilities.

Built in C++ and powered by the Unicorn Engine.

Key Features

  • Syscall-Level Emulation: Instead of reimplementing Windows APIs, the emulator operates at the syscall level, allowing it to leverage existing system DLLs
  • Advanced Memory Management: Supports Windows-specific memory types including reserved, committed, built on top of Unicorn's memory management
  • Complete PE Loading: Handles executable and DLL loading with proper memory mapping, relocations, and TLS
  • Exception Handling: Implements Windows structured exception handling (SEH) with proper exception dispatcher and unwinding support
  • Threading Support: Provides a scheduled (round-robin) threading model
  • State Management: Supports both full state serialization and fast in-memory snapshots
  • Debugging Interface: Implements GDB serial protocol for integration with common debugging tools (IDA Pro, GDB, LLDB, VS Code, ...)

Perfect for security research, malware analysis, and DRM research where fine-grained control over process execution is required.

Code Disclaimer

The project is still in a very early, prototypy state. The code still needs a lot of cleanup and many features and syscalls need to be implemented. However, constant progress is being made :)

Preview

Preview

YouTube Overview

YouTube video

Click here for the slides.

Description
Languages
C++ 84.9%
TypeScript 10.1%
Rust 2.7%
CMake 1.5%
CSS 0.3%
Other 0.4%